Since iOS 11 is not publicly jailbroken, you're in a predicament. One idea that would work is to back port the app with a private DYLD shared cache (from 11) into iOS 10.x which is jailbroken, and then inject into it.

Sure it is. Just grab your favourite IPSW from iOS 10 or later (or if before, make sure decryption keys exist) and the rootFS will be the largest .dmg in the IPSW (usually between 1.5 and 2.2GB). If encrypted, note that the key is not the same as a password - I suggest vfdecrypt in that case. But from iOS 10 and later you should be able to just mount it (unless it's an APFS dmg and you're on El Capitan or lower, which has no APFS support).

Alternatively, you can extract the cache from OTAs... always unencrypted and no HFS/APFS to deal with whatsoever.

Siguza wrote:Sure it is. Just grab your favourite IPSW from iOS 10 or later (or if before, make sure decryption keys exist) and the rootFS will be the largest .dmg in the IPSW (usually between 1.5 and 2.2GB). If encrypted, note that the key is not the same as a password - I suggest vfdecrypt in that case. But from iOS 10 and later you should be able to just mount it (unless it's an APFS dmg and you're on El Capitan or lower, which has no APFS support).

Alternatively, you can extract the cache from OTAs... always unencrypted and no HFS/APFS to deal with whatsoever.

Hello there, I don't get why using the dyld cache here? Could you explain some? Or if @mopheous could help? And where to get the OTA file to download? Thanks

Siguza wrote:Sure it is. Just grab your favourite IPSW from iOS 10 or later (or if before, make sure decryption keys exist) and the rootFS will be the largest .dmg in the IPSW (usually between 1.5 and 2.2GB). If encrypted, note that the key is not the same as a password - I suggest vfdecrypt in that case. But from iOS 10 and later you should be able to just mount it (unless it's an APFS dmg and you're on El Capitan or lower, which has no APFS support).

Alternatively, you can extract the cache from OTAs... always unencrypted and no HFS/APFS to deal with whatsoever.

Hello there, I don't get why using the dyld cache here? Could you explain some? Or if @mopheous could help? And where to get the OTA file to download? Thanks

Siguza wrote:Sure it is. Just grab your favourite IPSW from iOS 10 or later (or if before, make sure decryption keys exist) and the rootFS will be the largest .dmg in the IPSW (usually between 1.5 and 2.2GB). If encrypted, note that the key is not the same as a password - I suggest vfdecrypt in that case. But from iOS 10 and later you should be able to just mount it (unless it's an APFS dmg and you're on El Capitan or lower, which has no APFS support).

Alternatively, you can extract the cache from OTAs... always unencrypted and no HFS/APFS to deal with whatsoever.

Hello there, I don't get why using the dyld cache here? Could you explain some? Or if @mopheous could help? And where to get the OTA file to download? Thanks